Implementation method and application of security authentication function return value

A technology of security authentication and implementation method, applied in the field of information security, it can solve the problems of result reliability discount, no interaction, and inability to determine the validity of the return value of the called function, so as to reduce the possibility, prevent security attacks, and reduce the Tampering effect

Active Publication Date: 2022-03-01
HENGBAO
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, considering the increasingly complex use environment and increasingly precise attack methods, in some code running scenarios with relatively high security requirements, the calling function cannot determine the validity of the returned value of the called function (such as whether it is external intentional modification), in addition, the function caller and the called party have no interaction when performing the calling operation, so the reliability of the result returned by the called party is greatly reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and application of security authentication function return value
  • Implementation method and application of security authentication function return value

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0028] The embodiment of this application provides a method for realizing the return value of the security authentication function, such as figure 1 As shown, it is applicable to any application that requires the return value of the function, including function calls within the same application, function calls between different applications on the same device, and function calls between different applications on different devices.

[0029] For the function call in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a method for realizing a return value of a security authentication function and an application thereof. The method includes that the calling function and the called function pre-negotiate function return value expressions in different states; when the called function executes security authentication, it generates the return value of the function to be processed, and determines the shift random number according to the return value of the function to be processed ;The called function performs shift processing on the return value of the function to be processed according to the shift random number, obtains the final function return value, and returns the function return value to the calling function; The final function return value is analyzed to determine the state indicated by the function return value. The application method is used to realize a certain degree of interaction between the calling function and the called function during the calling operation, and the processed function return value cannot be easily identified, which ensures the safety of the function execution result and reduces the function return. Potential for the value to be tampered with on return.

Description

technical field [0001] The present application relates to the field of information security, in particular to a method and application for realizing a return value of a security authentication function. Background technique [0002] In common code writing, the return value of a function indicates success or failure, usually simple 0 and 1, or true and false. In the current code writing method based on security authentication functions, the Hamming distance is generally used for the return value of the function (used in the data transmission error control code, indicating that the number of corresponding bits of two words of the same length is different), that is, the return value of the function The corresponding bit values ​​in the value are opposite, such as 0x5A and 0xA5. [0003] However, considering the increasingly complex use environment and increasingly precise attack methods, in some code running scenarios with relatively high security requirements, the calling fun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/54
CPCG06F21/54
Inventor 李勇许传勋
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products